Allied Debt Collection of Virginia, L.L.C. v. Nautica Entertainment, L.L.C.

[Cite as Allied Debt Collection of Virginia, L.L.C. v. Nautica Entertainment, L.L.C., 2019-Ohio-4055.] COURT OF APPEALS OF OHIO EIGHTH APPELLATE DISTRICT COUNTY OF CUYAHOGA ALLIED DEBT COLLECTION OF : VIRGINIA, L.L.C., : Plaintiff-Appellee, : No. 107678 v. : NAUTICA ENTERTAINMENT, L.L.C., ET AL., : Defendants-Appellants. : JOURNAL ENTRY AND OPINION JUDGMENT: AFFIRMED IN PART, REVERSED IN PART, AND REMANDED RELEASED AND JOURNALIZED: October 3, 2019 Civil Appeal from the Cuyahoga County Court of Common Pleas Case No. CV-17-880787 Appearances: Patrick J. Milligan Co., L.P.A., and Patrick J. Milligan, for appellees. Hahn Loeser & Parks, L.L.P., Eric B. Levasseur, Anna Leigh Gecht, and Dennis R. Rose, for appellants. MICHELLE J. SHEEHAN, J.: Defendants-appellants Nautica Entertainment, L.L.C., Jacobs Entertainment, Inc., Jacobs Investments, Inc., and Mary Horoszko (collectively “Nautica” or “Nautica Defendants”) appeal from the trial court’s order compelling the production of the electronically stored information (“ESI”), or “mirror image,” of “all Nautica’s computers used by Mary Horoszko.” Because we find the trial court’s order was warranted under the circumstances, yet failed to establish adequate protections to safeguard the confidentiality of the information contained on the computer systems to be imaged, we affirm in part, reverse in part, and remand. Procedural History and Substantive Facts On May 23, 2017, plaintiff-appellee Allied Debt Collection of Virginia, L.L.C. (“Allied”) filed a complaint against the Nautica Defendants, Jeffrey Livingston, and Chad Barth for actions stemming from a Kid Rock concert held at the Jacobs Pavilion in the Nautica Entertainment Complex during the 2016 Republican National Convention. Allied states that it is a Virginia limited liability company and assignee of any tort claims belonging to Blue Star Productions, L.L.C. (“Blue Star”). The complaint alleged tortious interference with a contract between Concerts for a Cause, Inc. (“CFAC”) and Blue Star, Virginia statutory business conspiracy, fraud, theft in violation of R.C. 2307.61, and civil conspiracy. Barth is President and a director of CFAC. Livingston is allegedly the fundraiser who handled all negotiations on behalf of CFAC and Barth. According to Allied, Blue Star had contracted Kid Rock, among other acts, to perform concerts during the convention, and Blue Star searched for a venue in Cleveland for its concerts. Blue Star ultimately rented Jacobs Pavilion, which is owned and operated by Nautica Entertainment, through CFAC, under a shared-use arrangement whereby Blue Star agreed to promote and produce its music concerts at Jacobs Pavilion in exchange for providing CFAC with 1,200 Blue Star issued tickets to the Kid Rock concert. CFAC could in turn allocate the tickets to sponsors and guests. Allied claims that Nautica Defendants tortiously interfered with Blue Star’s arrangement with CFAC and conspired with CFAC to circumvent Blue Star’s ticketing process by issuing unauthorized wristbands to third parties for entry to the concert. Allied maintains that this scheme resulted in thousands of people accessing the Kid Rock concert without a Blue Star ticket, in contravention of the Blue Star/CFAC arrangement. Discovery On September 6, 2017, the court held a case management conference during which the court scheduled a paper discovery cutoff of November 6, 2017. During the conference, the parties agreed to forego electronic discovery and would exchange paper discovery only. The parties exchanged written discovery. Discovery disputes ensued, with both sides claiming discovery abuses. On April 5, 2018, Allied filed a motion to compel Nautica Defendants and Jeffrey Livingston to respond to Allied’s request for interrogatories and requests for production of documents. Regarding Nautica Defendants, Allied claimed that Nautica failed to fully answer several interrogatories and failed to produce numerous requested documents. Both Nautica Defendants and Livingston opposed the motion. Thereafter, the parties entered into a stipulated protective order. On June 11, 2018, the trial court granted Allied’s motion to compel, ordering Nautica and Livingston to respond to discovery within five days from the date of the order or face sanctions. Nautica Defendants served amended and supplemental discovery responses, which included 2,495 additional pages of documents. Claiming Nautica’s amended and supplemental discovery responses were still deficient, Allied filed a motion to show cause on July 25, 2018. Within this motion, Allied requested ESI for the first time. In its motion to show cause concerning Nautica Defendants’ paper discovery, Allied claimed that Nautica Defendants “habitually engaged in dilatory tactics, failed to meet their discovery obligations, and engaged in a rolling document production.” In referencing the documents it had received in response to its requests, Allied noted that it had received a purportedly “altered email chain” between Horoszko and Chad Barth of CFAC. In a footnote to this reference, Allied explained that Barth’s email production included an email that contained the word “wristbands” in two locations, while Horoszko’s production of that same email exchange did not: Barth’s email production: Wire I’m working on as we speak…will let you know amount and confirmation # shortly. Wristbands we’re working on a plan and executing it within the next hour. * * * How many of those 4,450 do you have? How many are committed to sponsors? I need the wristbands and info about today’s wire. Please and thank you. (Emphasis added.) Horoszko’s email production: Wire I’m working on as we speak…will let you know amount and confirmation # shortly. * * * How many of those 4,450 do you have? How many are committed to sponsors? I need info about today’s wire. Please and thank you. Allied had therefore surmised that Horoszko had altered her email to delete all references to “wristbands.” Consequently, within this footnote, Allied “request[ed] the court order Nautica to produce the doctored email in native format.” Nautica Defendants opposed Allied’s motion, along with this new request. On August 14, 2018, Nautica Defendants also filed a motion to compel responses to its written discovery requests propounded upon Allied, which the court ultimately held in abeyance. August Hearing The court held a hearing on August 15, 2018, during which the parties were scheduled to address Allied’s motion to show cause on the alleged discovery issues. At the hearing, however, the court informed the parties that the hearing would instead address “some emails that were exchanged that caused concern to [Allied], who is now asking for further information from [Nautica Defendants].” And the parties proceeded to address the purportedly altered email. During the hearing, Allied expanded its initial footnote request for “the doctored email in native format” to include all email communications, requesting “e-discovery with respect to Nautica’s emails” and “an order * * * requiring Nautica to produce the electronic email communications in their native e-discovery format.” (Emphasis added.) Allied argued that ESI discovery is inherent in its document request and that one altered email suggests there may be more, thus justifying the need for ESI. Nautica opposed Allied’s new request, arguing that the parties agreed at the case management conference that the parties would exchange paper discovery due to the timing and cost concerns associated with electronic discovery, the parties had not been previously subjected to produce any ESI, there had been no discussions concerning the proper ESI protocols, Allied had the opportunity to depose Horoszko on the altered email, and ordering ESI now would result in an undue burden and unfair cost to Nautica Defendants. Without offering any explanation concerning the conflicting emails, Nautica’s counsel stated only that Nautica Defendants “dispute that there was something inappropriate done with that email.” Acknowledging that this hearing pertained only to the allegedly altered email, the court inquired of Nautica whether there were any other reasons the court should not order ESI discovery in this matter, to which Nautica Defendants replied that they have abided by the previously agreed upon discovery procedure, discovery in the case has become extremely costly, and they believe ESI discovery would be unduly burdensome and inappropriate. The court then ordered ESI discovery “with respect to [Allied’s] request motion,” noting that it had not heard “any specific reasons why it’s too burdensome despite the normal, you know, costs of litigation that this is, according to Plaintiff seeking a $4.5 million verdict, that would require me to not order this.” After ordering the ESI discovery of “all the emails,” the court instructed the parties’ two IT experts to confer on the issue. Thereafter, the court advised the parties that its order would be journalized. A review of the record, however, reveals that no journal entry was entered. September Hearing On September 5, 2018, the court held a hearing on Allied’s motion to show cause regarding Nautica’s responses to Interrogatory Nos. 7 and 12-14 and Document Request Nos. 4, 30, and 36. During the hearing, the court found Nautica Defendants in contempt for their failure to sufficiently respond to Allied’s discovery requests, stating “It’s been admitted by both parties that they didn’t provide documents. They refer to someone else’s production of documents and that they didn’t understand what the word ‘communication’ meant and that — this has been going on long enough, and it needs to stop.” The court then instructed Allied to produce information pertinent to sanctions against Nautica, such as attorney fees. The court also discussed scheduling a hearing on Nautica Defendants’ motion to compel. Additionally, at the September hearing, the court addressed “the altered email issue.” In its opening statement, Allied’s counsel argued that there are two main issues the court should consider in granting its motion to show cause — the financial issues or records concerning Livingston that had not been fully produced and the communications between the parties that revealed a discrepancy in emails between Barth and Horoszko that referenced wristbands. Livingston’s counsel asserted that Allied indeed obtained all the requested records. Counsel for Nautica Defendants asserted that Nautica had fully responded to all discovery requests, including “thousands of emails.” In addressing Allied’s second issue, the altered email issue, Nautica’s counsel represented that the parties had numerous “productive discussions,” presumably off the record, regarding how to go about conducting the search, electronically, but the parties disagreed on the scope of the search. Counsel also informed the court that Allied apparently expanded its request for ESI once again, now seeking more than the emails associated with Horoszko: Your Honor, as I believe the court will hear, what the plaintiffs have proposed is effectively to have a third-party outside vendor come in and do a complete image of Ms. Horoszko’s computer. And it’s unclear to me whether they’ve suggested that the servers should also somehow be included. But they’ve at least I believe said Ms. Horoszko’s computer. Counsel then noted his concerns regarding potential attorney-client privilege and other confidential or proprietary information and the risk of placing this information in the hands of a third-party vendor with no restrictions. Counsel further argued that “anything beyond the email-related data would be wholly irrelevant, [] overbroad, and beyond what this court had ordered at the last hearing.” In response, the court stated: Okay. So I see a very simple and easy solution to solve these things. That is a confidentiality protective agreement with the third-party vendor which is done pretty routinely whenever there’s a third-party vendor who images a computer and also an opportunity for your IT person to identify as — in conjunction with the mirror image exactly what communications came from your firm. It’s not that hard to do. * * * Write up an agreement, and you’re done. Nautica’s counsel indicated that he would be willing to propose an order that would provide “strict limitations on what [the] third-party vendor could do with this information,” because the parties had yet to agree on the parameters for the ESI search. In response, Allied’s counsel once again linked the ESI issue with its original motion to compel interrogatories, noting that the altered email was revealed during the initial discovery exchange, and counsel agreed that there should be an order in place concerning the ESI. After the majority of the September hearing was spent discussing specific interrogatories and document requests and the court found Allied’s motion well taken and found Nautica in contempt concerning “document dumps” and “misunderstanding communications,” Allied’s counsel raised the ESI issue. The court asked Nautica Defendants if there was any reason they could not create a confidentiality agreement concerning the ESI. Nautica objected on the grounds that the request for ESI was overbroad and not consistent with what had been discussed at the August hearing; however, counsel indicated that he would work with opposing counsel to craft an order that would ensure the necessary confidentiality safeguards. At this point, the court stated, “You had this opportunity for all this time, and now we’re down to this where I have to order a mirror image of a computer to get this information to Plaintiffs. I’m not going to take it anymore. Write an order, protective order. I’ll sign it, and we’ll just get it done.” The court then noted that “[w]e’ll sort out attorney-client privileges, in camera inspections. Just bring them to me.” According to Nautica Defendants, they attempted in good faith to reach an agreement with Allied on a joint stipulated ESI order but were ultimately unable to agree on the terms, including the time in which Nautica could conduct a privilege review and the search methodology utilized to protect against the disclosure of proprietary and confidential information. Thereafter, the parties each filed a proposed ESI order. Nautica objected to Allied’s proposed order. The Trial Court’s Discovery Order On September 12, 2018, the court issued the following order: Hearing held for plaintiff’s motion to show cause why defendants should not be held in contempt for violating this court’s order compelling discovery. Defendants found in contempt of court for their failure to respond with particularity to interrogatories and requests for documents. Plaintiff to propose any adverse inference of fact relative to documents/information not produced to be considered by the jury and provide defense counsel with affidavit detailing attorney fees and expenses related to the efforts to compel discovery, preparation of the motion, and prosecuting the show cause hearing. Attorney fees hearing to be set. Defendant’s duty to comply with all discovery continues and is ongoing. Defendants ordered to provide mirror image of all Nautica’s computers used by Mary Horoszko through third-party vendor. See ESI order adopted and incorporated herein and entered under separate entry. Expanding Allied’s request for “e-discovery with respect to Nautica’s emails,” the trial court ordered Nautica Defendants to produce a “mirror image of all Nautica’s computers used by Mary Horoszko.” In so doing, the trial court adopted and incorporated into its order Allied’s entire proposed ESI order verbatim. That order compelled ESI, utilizing the third-party vendor engaged by Allied, Vestige, with the following limitations and conditions: 1. Vestige shall collect the requested ESI from Nautica and Horoszko by imaging and inventorying (i) the Nautica computer regularly used by Horoszko and (ii) any production/non-backup server where e-mails associated with her e-mail account * * * (or any other e-mail account she has used to conduct business on behalf of Nautica, if any) (collectively, the “Horoszko Accounts”) might otherwise be electronically stored (collectively, the “Imaged ESI”). With respect to the imaging of any server, such imaging shall be limited to those ESI files associated with the Horoszko Accounts or where such ESI might be electronically stored. Vestige shall be responsible for collecting the ESI within five (5) days of the entry of this Order at a place, date and time mutually agreeable between Vestige and Nautica’s information technology (“IT”) personnel. Nautica and/or Nautica and Horoszko’s counsel’s IT personnel shall have the right to be present and supervise the imaging and inventorying of any ESI collected by Vestige, and shall be provided an exact copy of any ESI forensically imaged by Vestige prior to departing the collection locale. 2. Nautica and Horoszko’s counsel shall have the right to review the Imaged ESI for any information protected by the attorney-client privilege (The “Protected Information”) and shall create and produce a log of any such Protected Information for delivery to Vestige and Allied’s counsel within three (3) day thereof. Upon receipt of the log identifying Protected Information, Vestige shall separate the Protected Information from the Imaged ESI for purpose of production and promptly produce to Allied all other ESI for the period October 1, 2014 through the present date. Allied’s counsel may request any information withheld from production by Nautica and Horoszko to be submitted by Vestige to the Court for determination of whether the Protected Information is attorney-client privileged. 3. All ESI (i) collected by Vestige, and (ii) provided to Allied as part of the Production Image, shall be deemed and treated as “confidential Information” under the Court’s previously entered Stipulated Protective Order (“SPO”). At all times while in possession of the ESI, Vestige and Allied shall be bound by the SPO, a copy of which shall be provided by Allied’s counsel to Vestige before it collects any ESI. Vestige shall review and execute Exhibit A to the SPO and provide an original executed copy of the same to Nautica and Horoszko’s counsel and/or IT personnel prior to the collection of any ESI. 4. Within five (5) days of the final disposition of this action, whether by entry of judgment or settlement, Vestige shall destroy (and attest by affidavit to the destruction) or return to Nautica and Horoszko’s counsel any ESI. 5. Although all ESI produced to Allied by Vestige shall be deemed and treated as Confidential Information under the SPO, Allied may petition the Court to deem some of the ESI collected by Vestige and produced to Allied non-confidential, if necessary, pursuant to Section 15 of the SPO. On September 13, 2018, Nautica Defendants appealed the trial court’s order pertaining to the ESI.1 Assignments of Error On appeal, Nautica Defendants assign three errors for our review, which we will address together: I. The trial court abused its discretion in ordering the Nautica Defendants to produce forensic mirror images of their computers and servers to Allied without satisfying the first step of the Bennett test. II. The trial court abused its discretion in ordering the Nautica Defendants to produce forensic mirror images of their computers and servers to Allied without instituting adequate procedural safeguards to protect their privileged, proprietary, personal, and confidential electronically stored information (“ESI”). III. The trial court abused its discretion in ordering the Nautica Defendants to produce forensic mirror images of their computers and servers to Allied without limiting the scope of the production to only 1 On September 20, 2018, this court sua sponte dismissed Nautica’s appeal for lack of final appealable order, finding that “the mere adjudication of contempt of court is not a final appealable order until a sanction or penalty is imposed.” Nautica Defendants filed a motion for reconsideration of the dismissal. The motion clarified that Nautica’s appeal concerns only the second part of the trial court’s order that compelled the production of a “mirror image of all Nautica’s computers * * *,” which is a final appealable order because the order compels the production of forensic imaging of a computer hard drive and the disclosure of privileged and/or confidential material. In support, Nautica cited Fasteners for Retail, Inc. v. Dejohn, 8th Dist. Cuyahoga No. 100333, 2014-Ohio-1729, and Bennett v. Martin, 186 Ohio App.3d 412, 2009-Ohio-6195, 928 N.E.2d 763 (10th Dist.). Nautica’s motion was unopposed. Upon reconsideration, we reinstated Nautica’s appeal. the ESI reasonably calculated to lead to the discovery of admissible evidence. Law and Analysis Nautica Defendants contend that the trial court abused its discretion in compelling the forensic mirror imaging of “all Nautica’s computers used by Mary Horoszko.” They argue that the trial court failed to conduct the appropriate balancing test, which includes weighing the parties’ interest in discovery against Nautica Defendants’ competing interests in privacy and confidentiality; the court failed to institute adequate procedural safeguards for the protection of Nautica’s privileged, proprietary, and confidential information; and the court’s order was overbroad and unduly burdensome. Civ.R. 26 The Ohio Rules of Civil Procedure provide a right to the “liberal discovery of information.” Ward v. Summa Health Sys., 128 Ohio St.3d 212, 2010- Ohio-6275, 943 N.E.2d 514, ¶ 9, citing Moskovitz v. Mt. Sinai Med. Ctr., 69 Ohio St.3d 638, 661-662, 635 N.E.2d 331 (1994). This discovery may be obtained through “deposition upon oral examination or written questions; written interrogatories; production of documents, electronically stored information, or things or permission to enter upon land or other property, for inspection and other purposes; physical and mental examinations; and requests for admission.” Civ.R. 26(A). Civ.R. 26(B) governs the scope of the information that a party may obtain through discovery: [A]ny matter, not privileged, which is relevant to the subject matter involved in the pending action, whether it relates to the claim or defense of the party seeking discovery or to the claim or defense of any other party, including the existence, description, nature, custody, condition and location of any books, documents, electronically stored information, or other tangible things and the identity and location of persons having knowledge of any discoverable matter. Civ.R. 26(B)(1). Additionally, the information sought must “appear[] reasonably calculated to lead to the discovery of admissible evidence.” Id. Specifically regarding electronically stored information, Civ.R. 26(B)(4) provides as follows: A party need not provide discovery of electronically stored information when the production imposes undue burden or expense. On motion to compel discovery or for a protective order, the party from whom electronically stored information is sought must show that the information is not reasonably accessible because of undue burden or expense. If a showing of undue burden or expense is made, the court may nonetheless order production of electronically stored information if the requesting party shows good cause. The court shall consider the following factors when determining if good cause exists: (a) whether the discovery sought is unreasonably cumulative or duplicative; (b) whether the information sought can be obtained from some other source that is less burdensome, or less expensive; (c) whether the party seeking discovery has had ample opportunity by discovery in the action to obtain the information sought; and (d) whether the burden or expense of the proposed discovery outweighs the likely benefit, taking into account the relative importance in the case of the issues on which electronic discovery is sought, the amount in controversy, the parties’ resources, and the importance of the proposed discovery in resolving the issues. In ordering production of electronically stored information, the court may specify the format, extent, timing, allocation of expenses and other conditions for the discovery of the electronically stored information. Civ.R. 26(B)(4); Townsend v. Ohio DOT, 10th Dist. Franklin No. 11AP-672, 2012- Ohio-2945, ¶ 15; Loc.R. 21.3(F)(2)(c) of the Court of Common Pleas of Cuyahoga County, General Division (detailing similar factors for the court to consider when determining if good cause exists for the production of ESI). An appellate court generally reviews a discovery dispute for an abuse of discretion. Ward, 128 Ohio St.3d 212, 2010-Ohio-6275, 943 N.E.2d 514, at ¶ 13; Fasteners for Retail, Inc., 8th Dist. Cuyahoga No. 100333, 2014-Ohio-1729, at ¶ 19 (reviewing the trial court’s order of forensic imaging of a computer’s hard drive under the abuse of discretion standard). An “abuse of discretion ‘connotes more than an error of law or judgment; it implies that the court’s attitude is unreasonable, arbitrary, or unconscionable.’” Blakemore v. Blakemore, 5 Ohio St.3d 217, 219, 450 N.E.2d 1140 (1983), quoting State v. Adams, 62 Ohio St.2d 151, 157, 404 N.E.2d 144 (1980). And absent an abuse of discretion, we must affirm the trial court’s disposition on discovery matters. Lightbody v. Rust, 137 Ohio App.3d 658, 663, 739 N.E.2d 840 (8th Dist.2000). Forensic Imaging The trial court ordered Nautica Defendants to produce “all Nautica’s computers used by Mary Horoszko” for a forensic examination. A forensic image, also known as a “mirror image,” will “‘replicate bit for bit, sector for sector’” all allocated and unallocated space on a computer’s hard drive, including any embedded, residual, and deleted data. Bennett, 186 Ohio App.3d 412, 2009-Ohio- 6195, 928 N.E.2d 763, at ¶ 40, quoting Balboa Threadworks, Inc. v. Stucky, D.Kan. No. 05-1157-JTM-DWB, 2006 U.S. Dist. LEXIS 29265, 7 (Mar. 24, 2006); Ferron v. Search Cactus, L.L.C., S.D.Ohio No. 2:06-CV-327, 2008 U.S. Dist. LEXIS 34599, 10, fn. 5 (Apr. 28, 2008) (“A mirror image copy represents a snapshot of the computer’s records. * * * It contains all the information in the computer, including embedded, residual, and deleted data.”). Courts are generally reluctant to compel forensic imaging “largely due to the risk that the imaging will improperly expose privileged and confidential material contained on the hard drive.” Bennett at ¶ 40. To determine whether forensic imaging is warranted, as opposed to standard discovery procedures, the trial court must (1) weigh the parties’ interest in obtaining discovery against privacy concerns; and (2) institute a protective protocol to ensure that forensic imaging is not unduly intrusive. Bennett at ¶ 41, 47. This court has adopted the Bennett two- part test utilized by the Tenth District Court of Appeals in Fasteners for Retail, Inc. at ¶ 21. Weighing of Interests Before compelling forensic imaging, a trial court must first weigh the necessity of obtaining the electronic discovery against any privacy concerns: “[A] court must weigh ‘the significant privacy and confidentiality concerns’ inherent in imaging against the utility or necessity of the imaging. * * * In determining whether the particular circumstances justify forensic imaging, a court must consider whether the responding party has withheld requested information, whether the responding party is unable or unwilling to search for the requested information, and the extent to which the responding party has complied with discovery requests. * * * When a requesting party demonstrates either discrepancies in a response to a discovery request or the responding party’s failure to produce requested information, the scales tip in favor of compelling forensic imaging.” (Citations omitted.) Fasteners for Retail, 8th Dist. Cuyahoga No. 100333, 2014- Ohio-1729, at ¶ 24, quoting Bennett at ¶ 41; see also Scott Process Sys. v. Mitchell, 5th Dist. Stark No. 2012CA00021, 2012-Ohio-5971, ¶ 37-38 (finding the order for forensic imaging in error where the requesting party failed to demonstrate that paper production of records was insufficient or that the requesting party’s need for forensic imaging outweighed the party’s privacy interests); Nithiananthan v. Toirac, 12th Dist. Warren No. CA2011-09-098, 2012-Ohio-431, ¶ 9 (the party requesting forensic imaging must demonstrate a “background of noncompliance” with discovery under part one of the Bennett framework); Scotts Co., L.L.C. v. Liberty Mut. Ins. Co., S.D.Ohio No. 3:06-CV-899, 2007 U.S. Dist. LEXIS 43005, 4- 5 (June 12, 2007), quoting Diepenhorst v. Battle Creek, W.D. Mich. No. 1:05-CV- 734, 2006 U.S. Dist. LEXIS 48551, 10-11 (June 30, 2006) (expressing reluctance to permit intrusive forensic imaging as a matter of course on a requesting party’s “mere suspicion” the opponent is withholding information or to “address the bare possibility of discovery misconduct”). Step One: Necessity of the Imaging vs. Privacy Concerns In Bennett, the court found that the defendants repeatedly represented that they had disclosed all responsive documents when they had not. Bennett, 186 Ohio App.3d 412, 2009-Ohio-6195, 928 N.E.2d 763, at ¶ 42. Additionally, the court noted that the defendants had a “lackadaisical and dilatory approach to providing discovery” when they engaged in last-minute discovery practice. Id. Thus, after applying the balancing factors, the court determined that the defendants demonstrated a “willful disregard of the discovery rules,” and given their “background of noncompliance,” the trial court properly ordered forensic imaging. Id. In Fasteners, we determined that the record concerning discovery did not demonstrate the requisite showing of the defendants’ noncompliance with discovery under the first prong of the Bennett test. Specifically, we noted that the record did not demonstrate that the documents sought by the plaintiff “were being unlawfully withheld and not available from [Plaintiff’s] own information or other sources.” Fasteners for Retail at ¶ 29. Nautica Defendants contend that the trial court failed to satisfy the first step of the Bennett analysis. In support, they claim that their conduct concerning Allied’s request for ESI was not improper and therefore forensic imaging was not warranted and the court “ignored” their privacy concerns. We find Nautica Defendants’ argument unpersuasive. Here, the record shows that in the course of Nautica Defendants’ document production, Allied discovered two conflicting emails between Horoszko and Barth. Barth’s copy of the email included references to wristbands, while Horoszko’s copy contained no references to wristbands. This discovery, Allied contends, led to its belief that the email chain had been altered, and Allied became concerned that there were other “altered” emails of which Allied was unaware. In response to this discovery, Allied made a new motion (within its motion for sanctions regarding the paper discovery, albeit in a footnote) requesting the court compel forensic imaging of Nautica computers used by Horoszko. In addition, the record shows that following a hearing on Allied’s motion to show cause regarding certain paper discovery, the trial court found Nautica Defendants in contempt for failing to fully and properly answer several interrogatories and failing to produce numerous requested documents, namely Interrogatory Nos. 7 and 12-14 and Document Request Nos. 4, 30, and 36. Nautica Defendants argue that the court’s sanctions applied only to Nautica’s paper discovery and their conduct relating to this new request for ESI was not improper. We agree that the court’s sanctions appear to pertain to Nautica’s conduct in responding to Allied’s paper discovery requests. The trial court’s order at issue here, rather, is an ESI order in response to the alleged “altered email chain.” The newly discovered “altered email chain,” however, demonstrates a discrepancy in discovery that weighs in favor of compelling forensic imaging. Bennett, 186 Ohio App.3d 412, 2009-Ohio-6195, 928 N.E.2d 763, at ¶ 41 (finding “the scales tip in favor of compelling forensic imaging” when a requesting party demonstrates discrepancies in a response to a discovery request); see also Simon Property Group L.P. v. MySimon, Inc., 194 F.R.D. 639, 641 (S.D.Ind.2000) (permitting the plaintiff to inspect the defendant’s deleted computer files where the plaintiff demonstrated “troubling discrepancies” concerning the defendant’s document production); Playboy Ents., Inc. v. Welles, 60 F.Supp.2d 1050, 1054-55 (S.D. Cal. 1999) (permitting forensic imaging of a defendant’s computer where the parties, pursuant to a document request, discovered an email chain produced by one defendant that was not produced by a codefendant and where the parties later learned that the defendant customarily deleted emails after litigation had commenced). Nautica Defendants do not dispute the existence of the discrepancy, yet they offer no explanation for the apparent conflict. And forensic imaging may reveal other deleted emails or altered emails on the Nautica computers used by Horoszko. When the court considered the Barth/Horoszko email discrepancy along with the history of Nautica Defendants’ discovery violations concerning paper discovery, where in fact the court found that Nautica Defendants repeatedly failed to produce documents, an order compelling forensic imaging was not unreasonable. Regarding Nautica Defendants’ privacy concerns, as discussed below, the record reflects the court considered Nautica Defendants’ privacy and confidentiality concerns and instituted certain protective protocols. But the unique discrepancy in discovery and the history of discovery violations weighed in favor of forensic imaging. In light of the foregoing, we cannot find the trial court abused its discretion in ordering forensic imaging under the circumstances. Viewing the record in its entirety, the showing required under the first prong of the Bennett analysis has been satisfied. Step Two: Protective Protocol “Even when a defendant’s misconduct in discovery makes forensic imaging appropriate, a court must protect the defendant’s confidential information as well as preserve any private and privileged information.” Bennett, 186 Ohio App.3d 412, 2009-Ohio-6195, 928 N.E.2d 763, at ¶ 47. A party’s purported failure to produce discovery as requested or ordered “will rarely warrant unfettered access to a party’s computer system.” Id. A trial court abuses its discretion when “its judgment entry permits unfettered forensic imaging of a party’s electronic devices and contains none of the Bennett protections required to conduct such forensic analysis. Fasteners for Retail, 8th Dist. Cuyahoga No. 100333, 2014-Ohio-1729, at ¶ 33, citing Scott Process Sys., 5th Dist. Stark No. 2012CA00021, 2012-Ohio-5971, at ¶ 36. The Bennett court suggested, and this court followed, a protocol for forensic imaging: “[A]n independent computer expert, subject to a confidentiality order, creates a forensic image of the computer system. The expert then retrieves any responsive files (including deleted files) from the forensic image, normally using search terms submitted by the plaintiff. The defendant’s counsel reviews the responsive files for privilege, creates a privilege log, and turns over the nonprivileged files and privilege log to the plaintiff.” Fasteners for Retail at ¶ 32, quoting Bennett at ¶ 47; Nithiananthan, 12th Dist. Warren No. CA2011-09-098, 2012-Ohio-431, at ¶ 19 (adopting the protocol suggested in Bennett and holding that “at minimum, several protective measures must be enforced when ordering forensic imaging”); Scott Process Sys., supra (adopting the Bennett protocol and reversing the trial court’s order for forensic imaging where the order contained “none of the Bennett protections”). In Bennett, the appellate court found that the trial court did not abuse its discretion in ordering forensic imaging as a sanction for the defendants’ noncompliance with the trial court’s orders. Bennett at ¶ 49. The appellate court determined, however, that the trial court erred “in not providing adequate protections to safeguard the confidentiality of the information contained on the computer systems to be imaged.” Id. Finding insufficient the trial court’s safeguards for privileged and confidential information, which included permitting the party to redact privileged information and designating certain confidential and personal information “for attorneys’ eyes only,” the appellate court stressed the importance of a proper protocol where forensic imaging is ordered, even where a party engages in misconduct: [W]e believe that more comprehensive protection is necessary, particularly given the sensitivity of the information at issue here. Bennett deserves a remedy for the prejudice caused by defendants’ misconduct, but that remedy should not require defendants to sacrifice highly-sensitive, confidential information that has no bearing on Bennett’s claims. Additionally, private information of the computers’ users — such as personal financial information and communications with friends and family — should not be subject to disclosure. Therefore, we conclude that the trial court abused its discretion in devising the procedure for the forensic imaging. We urge the trial court to adopt a protocol similar to the one described above. We believe that such a protocol would allow Bennett sufficient access to the computer systems to recover useful information, while also providing defendants with an opportunity to identify and protect privileged and confidential matter. Id. at ¶ 48. Mindful of the “potential intrusiveness” of a forensic examination, federal courts likewise utilize a “collection and review protocol” when compelling a forensic examination, such as the following: 1. An independent computer expert shall be appointed by the Court and shall mirror image [the party’s] computer system. 2. The parties have [a designated time in which to] meet and confer regarding their designation of an independent computer expert. If the parties cannot agree, on or before [a set date], each party shall submit its recommendation to the Court, and the Court will select the expert. 3. The appointed expert shall serve as an Officer of the Court. Thus, to the extent that this computer expert has direct or indirect access to information protected by attorney-client privilege, such disclosure will not result in any waiver of the [party’s] privilege. 4. The independent expert shall sign a confidentiality order. Additionally, the expert shall be allowed to hire other outside support if necessary in order to mirror image the [party’s] computer system. Any outside support shall be required to sign the same confidentiality order. 5. The expert shall mirror image the [party’s] computer system. 6. The [requesting party] shall provide a list of search terms to the Court to identify responsive documents to its document requests on or before [a set date]. After [the requesting party] has submitted the search terms to the Court, [the party] shall have 5 days to submit their objections to the Court regarding any of the search terms, which the court will rule upon. The Court will provide the search terms to the independent expert. 7. Once the expert has mirror imaged the [party’s] computer system, the expert shall search the mirror image results using the search terms. The results of the search terms and an electronic copy of all responsive documents shall be provided to the [party] and to the Court. 8. The [party] shall review the search term results provided by the independent expert and identify all responsive documents. The [party] shall either produce all responsive documents to the [requesting party] or identify those responsive documents not produced on a privilege log to the [requesting party] within 20 days of the date that the [party] receives the search term results from the independent expert. Any privilege log produced shall comply strictly with the [the rules of court]. 9. [The requesting party] shall pay for all fees and costs of hiring the independent expert at this time. However, if at a later time there is evidence of the [party’s] improper deletion of electronic documents or any other associated improper conduct, the Court will revisit this issue and consider charging [that party] for the fees and costs of the independent expert or imposing the fees and costs on the parties in a duly appropriate apportioned manner. 10. The independent expert shall provide a signed affidavit detailing the steps he or she took in mirror imaging the [party’s] computer system and searching the mirror image for the search terms within 5 days of providing the [party] and the Court with the results of the search for search terms in the mirror image. Wynmoor Community Council, Inc. v. QBE Ins. Corp., 280 F.R.D. 681, 687-688 (S.D.Fla.2012); Bank of Mongolia v. M&P Global Fin. Servs., 258 F.R.D. 514 (S.D.Fla.2009). Nautica Defendants contend that the trial court’s discovery order lacks adequate protective protocols to safeguard its privileged and confidential ESI. In support, Nautica argues that the court’s order contains no search methodology or search terms; the order does not exclude from the search information that is not privileged but is otherwise confidential, such as personal or proprietary information irrelevant to the underlying action; and the order’s provision of three days in which to conduct a privilege review of potentially hundreds of gigabytes of data is insufficient and unreasonable. Nautica Defendants also contend that the trial court’s order is overbroad and permits the production of irrelevant and confidential information that is not reasonably calculated to the discovery of admissible evidence. Thus, according to Nautica, the order exceeds the scope of discoverable information. Upon review, we find the trial court included some safeguards for Nautica Defendants’ privileged and confidential matter. The record shows that the court addressed Nautica Defendants’ privacy concerns, at least to some degree. During the September hearing, the court engaged in a colloquy with counsel for Nautica, during which counsel advised the court of his concern regarding protecting confidential information, attorney-client privilege, and other personal and private information arguably contained on Nautica’s computers. The court then instructed the parties to fashion a protective order and the court would sign it. The court further stated that the parties could address any issues concerning attorney-client privileges through in camera inspections, instructing, “Just bring them to me.” The court also executed an ESI order deeming all ESI produced to Allied as “Confidential Information” under the court’s previously entered Stipulated Protective Order. However, the trial court’s ESI order lacks sufficient protective protocols intended by Bennett and numerous other courts to safeguard Nautica Defendants’ confidential information. For example, the trial court’s order in this case failed to include a list of search terms in its order to narrow the production of documents. The court’s order also failed to outline a process by which the parties could submit search terms to identify responsive documents, provide objections to proposed search terms, and provide the search terms to an independent third-party computer expert. Allied suggests that a search term protocol using the term “wristbands” would not have exposed the “altered email chain” or any others from which Nautica deleted the term “wristbands” and therefore would not have been fruitful. We find no reason the parties are limited to one relevant search term. Given the opportunity, the parties could agree upon other equally availing search terms that would likely produce responsive documents. And having a procedure in place by which the parties can object to proposed search terms ensures that the parties’ interests are protected. Moreover, we find the lack of search terms and search protocol has resulted in an overbroad order that risks including information irrelevant to the underlying claims and information that may be personal, private, proprietary, or otherwise confidential. “Courts have been cautious in requiring the mirror imaging of computers where the request is extremely broad in nature and the connection between the computers and the claims in the lawsuit are unduly vague or unsubstantiated in nature.” Balboa Threadworks, Inc., D.Kan.No. 05-1157-JTM- DWB, 2006 U.S. Dist. LEXIS 29265, at 3. Likewise, where courts do compel forensic imaging, courts must utilize a protective protocol “to ensure that the forensic imaging is not unduly intrusive,” which protocol serves to protect the defendant’s confidential, private, and privileged information. Nithiananthan, 12th Dist. Warren No. CA2011-09-098, 2012-Ohio-431, at ¶ 19, 20. Here, the record shows that Allied’s initial request for “the doctored email in native format” (noted within a footnote in Allied’s motion for sanctions regarding paper discovery) developed into a request for “e-discovery with respect to Nautica’s emails” (at the August hearing) and ultimately resulted in the court’s order of “a mirror image of all Nautica’s computers used by Mary Horoszko.” Although the court’s ESI order provided a protocol in which the parties could arguably prevent the disclosure of attorney-client privilege (i.e. the creation of a privilege log), there is nothing in the order — through search terms or other instructions — that expressly required the third-party vendor or expert to limit its search to information relevant to Allied/Blue Star’s claims against Nautica Defendants or to exclude personal or confidential information, such as Horoszko’s personal or financial information or Nautica’s proprietary information. Rather, the order broadly states that the expert shall collect “ESI files associated with the Horoszko accounts or where such ESI might be electronically stored.” Without relevant search terms, or other limiting instructions, the court is essentially permitting unfettered access to irrelevant and confidential information contained in the Nautica computers used by Horoszko. Additionally, we find the trial court’s order failed to provide Nautica Defendants sufficient time in which to review responsive documents for privileged information. The court’s order provides that “counsel shall have the right to review the Imaged ESI for any information protected by the attorney-client privilege (The ‘Protected Information’) and shall create and produce a log of any such Protected Information for delivery to Vestige and Allied’s counsel within three (3) days thereof.” The record shows that thousands of documents have been produced in the course of paper discovery, and Nautica Defendants assert that forensic imaging could access hundreds of gigabytes of data. Given this large amount of data, the court’s allowance of only three days to review the records for privilege and responsiveness, appropriately supplement Nautica’s responses to discovery requests, and create a privilege log that expressly describes the nature of the documents or communications that are protected is unreasonable. See Ameriwood Industries v. Liberman, E.D.Mo. No. 4:06CV524-DJS, 2006 U.S. Dist. LEXIS 93380 (Dec. 27, 2006) (outlining a three-step procedure for forensic imaging and including in its “disclosure step” a period of 20 days for review and creation of privilege log); see also Wynmoor, 280 F.R.D. 681 (S.D.Fla.2012) (20 days for review and creation of privilege log); Bank of Mongolia, 258 F.R.D. 514 (20 days for review and creation of privilege log). Conclusion Based upon the discovery of a purportedly altered email chain and Nautica Defendants’ history of noncompliance with the trial court’s previous discovery orders, we find the trial court did not abuse its discretion in compelling forensic imaging of Nautica computers. We find, however, that the trial court abused its discretion in failing to establish the proper protective protocols that would allow Allied sufficient access to recover useful, relevant information, while also providing Nautica Defendants an opportunity to identify and protect privileged and/or confidential matter. We therefore affirm in part and reverse in part, and we remand to the trial court for further proceedings consistent with this opinion. In remanding, we urge the trial court to adopt a protocol similar to the protocols utilized by the cases referenced in this opinion. It is ordered that appellants and appellee share the costs herein taxed. The court finds there were reasonable grounds for this appeal. It is ordered that a special mandate issue out of this court directing the common pleas court to carry this judgment into execution. A certified copy of this entry shall constitute the mandate pursuant to Rule 27 of the Rules of Appellate Procedure. ___________________________ MICHELLE J. SHEEHAN, JUDGE EILEEN T. GALLAGHER, P.J., and RAYMOND C. HEADEN, J., CONCUR